Analysis

  • max time kernel
    117s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 21:19

General

  • Target

    27cb78261446f75ec6bdcda2a106a78e689e111da270961c81a18dcafb145240N.exe

  • Size

    537KB

  • MD5

    be3a86508bd0142ad89527a29e575e30

  • SHA1

    2d1f4fe460f75088be35154c692fbc3cec6f5a46

  • SHA256

    27cb78261446f75ec6bdcda2a106a78e689e111da270961c81a18dcafb145240

  • SHA512

    4ac6667759b2c9dbe193fe1c7997c1a6909fdda41aea76a6a23b47474e4b4d8dd5ccd130515f8a8160db330d68e151d1ac0b8b92389e960684a1a32918fe7dcf

  • SSDEEP

    12288:QMrby90M4uhV8fRN+ucZUjDH3wRyIQr554xqtENFaWLO:by/4A4/GZsXwRG95As

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\27cb78261446f75ec6bdcda2a106a78e689e111da270961c81a18dcafb145240N.exe
    "C:\Users\Admin\AppData\Local\Temp\27cb78261446f75ec6bdcda2a106a78e689e111da270961c81a18dcafb145240N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3464
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRE4437.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRE4437.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3612
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr724678.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr724678.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5100
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku207183.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku207183.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRE4437.exe

    Filesize

    395KB

    MD5

    87fb3375b9f2c7c49ef330a6df05e24c

    SHA1

    33f02cae469de429708f569b5d6e1c136ca54e58

    SHA256

    b967dee6f606b56ee572902143f7fd3c83d26cb3f7cefb718f090ce966a4e38c

    SHA512

    c3af1bc838ca3eb44fb66cd6d3aee10a57cf9d1c4ef8af104c358bd750bd34663611f055b5679870960785c2009594a1a1c4db037af5dcebfdd47069ae3946fa

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr724678.exe

    Filesize

    13KB

    MD5

    e53ce5a11aa42ea91b2b879b707b0f27

    SHA1

    37593c16ba8560a23f0a6036ad6a9d4f1466f791

    SHA256

    d59ae5dd2494e1548a1c9a1b0ff4db0298942e6c0e3cbe1e2cac55abc446d169

    SHA512

    f5e2f84423fd7c50ffb037cc7e02b4d945be77249e47783c902c9c5f7dd254a308580a3d8a96d796317a50c8dc4b8ce33f2410f21af4d2b6795029e2b443c173

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku207183.exe

    Filesize

    352KB

    MD5

    725e15819e6abc58fdca02e388e0e7d2

    SHA1

    629a18547c586508dc4d000993e5572e89281f9b

    SHA256

    7d775eee3b29f64ccbb96fe63b6926e1e39cc1aa1b23b148b9edfae8176124a2

    SHA512

    7a20a67d9751afdc060c90e7be2aa4718ed4f2ed5edbd05ebde7f2d0d067afa2a70556026b5cf5732108a001e39d0f972d86e52828a1f8a307a040ef7c9227fa

  • memory/968-62-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-84-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-935-0x0000000005D90000-0x0000000005DDC000-memory.dmp

    Filesize

    304KB

  • memory/968-22-0x00000000027A0000-0x00000000027E6000-memory.dmp

    Filesize

    280KB

  • memory/968-23-0x0000000004E70000-0x0000000005414000-memory.dmp

    Filesize

    5.6MB

  • memory/968-24-0x00000000029D0000-0x0000000002A14000-memory.dmp

    Filesize

    272KB

  • memory/968-28-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-36-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-88-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-86-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-82-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-80-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-78-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-76-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-74-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-72-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-70-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-66-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-64-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-934-0x0000000005C40000-0x0000000005C7C000-memory.dmp

    Filesize

    240KB

  • memory/968-56-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-933-0x0000000005C20000-0x0000000005C32000-memory.dmp

    Filesize

    72KB

  • memory/968-58-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-54-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-50-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-48-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-41-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-38-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-34-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-32-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-30-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-60-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-68-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-52-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-46-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-44-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-43-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-26-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-25-0x00000000029D0000-0x0000000002A0F000-memory.dmp

    Filesize

    252KB

  • memory/968-931-0x0000000005440000-0x0000000005A58000-memory.dmp

    Filesize

    6.1MB

  • memory/968-932-0x0000000005AE0000-0x0000000005BEA000-memory.dmp

    Filesize

    1.0MB

  • memory/5100-16-0x00007FFA0A033000-0x00007FFA0A035000-memory.dmp

    Filesize

    8KB

  • memory/5100-14-0x00007FFA0A033000-0x00007FFA0A035000-memory.dmp

    Filesize

    8KB

  • memory/5100-15-0x00000000007F0000-0x00000000007FA000-memory.dmp

    Filesize

    40KB